
If you've ever renewed an EV Code Signing certificate with SSL.com, you know the drill: resubmitting business docs you've sent five times before, waiting days for a manual review, and finally - that mandatory voice call to a business line. The entire process was designed for 20+ years ago, not today's CI/CD pipelines.
We recently migrated QliqSoft's application signing workflow to Azure Artifact Signing (formerly Trusted Signing). The contrast was immediate and staggering. The entire migration and testing took less than a day - what used to be a "Verification Week" became a "Verification Hour."
Before we walk through the new setup, it's worth naming the specific frustrations that pushed us to make the move. Anyone who has managed EV certificate renewals at a software company will recognize these:
Legacy code signing verification was designed for a world where software shipped on CDs. It doesn't belong in a modern deployment pipeline.
Azure Artifact Signing replaces manual bureaucracy with Identity-as-a-Service. Once you create a Trusted Signing Account in the Azure Portal, identity verification is handled in two automated stages - and the difference from the old way is night and day.
Provide your legal business name and website URL. Microsoft cross-references global business databases in real time. Instead of a multi-day manual phone call, verification is typically handled via a quick email link sent to a verified business contact. Time to complete: a few hours, not several days.
This is the "human anchor" for the certificate. You receive an email linking to Microsoft Entra Verified ID. Using the Microsoft Authenticator app, you scan a government ID (Passport or Driver's License) and complete a quick biometric selfie check. Once your personal ID is verified, it instantly validates your role within the organization request. The whole process takes minutes.
The identity validation form in the Azure Portal is straightforward and - critically - designed to pull from data Microsoft already has about your organization if you're in the Microsoft Partner Center or your Azure Tenant. Here's what it looks like:
A few notes on this form from our experience:
The final piece was wiring up the actual signing step. We use Advanced Installer for our Windows packaging, and it offers native support for Artifact Signing. This is what makes the "under one day" migration actually achievable - there's no custom scripting required.
https://eus.codesigning.azure.net), your Account Name, and your Certificate Profile name.# Example: Azure DevOps pipeline step for Artifact Signing
- task: AzureCLI@2
displayName: 'Sign Package with Trusted Signing'
inputs:
azureSubscription: 'Your-Azure-Subscription'
scriptType: 'bash'
scriptLocation: 'inlineScript'
inlineScript: |
az trustedsigning sign \
--endpoint "https://eus.codesigning.azure.net" \
--account "Your-Account-Name" \
--certificate-profile "Your-Certificate-Profile" \
--files "path/to/your/*.exe"
If your business info is already current in Microsoft Partner Center or your Azure Tenant, Organization validation can be nearly instantaneous. You can literally go from "starting the setup" to "first signed build" during a long lunch break.
By the afternoon of our migration day, we had gone from a "Certificate Expired" warning in production to a fully automated CI/CD pipeline producing properly signed binaries - with no manual steps, no phone calls, and no waiting.
The shift to Azure Artifact Signing isn't just about security. It's about developer velocity. Stop scheduling callbacks with certificate authorities and start signing in minutes. The old way was a tax on engineering time - and it's a tax we're not paying anymore.
Azure Artifact Signing uses Identity-as-a-Service instead of manual verification processes. Organization validation happens in hours via automated database checks and email verification, while individual verification uses Microsoft Entra Verified ID with biometric selfie checks. No more phone calls, physical certificates, or multi-week renewal cycles.
DevOps teams gain automated certificate management, seamless CI/CD integration, and elimination of manual renewal interruptions. There are no PFX passwords to manage, no local certificates to install, and no 'Verification Weeks' that disrupt deployment schedules. The entire process integrates with existing Azure CLI authentication.
The entire migration can be completed in under one day. Organization validation typically takes a few hours if your business info is current in Microsoft Partner Center. Individual verification takes minutes using the Microsoft Authenticator app. Most of the time is spent updating your build tools to point to the new Azure endpoints.
Yes, modern build tools including Advanced Installer have native Azure Artifact Signing support. You simply switch from your legacy provider to 'Trusted Signing' in the tool's settings, enter your Azure endpoint and account details, and leverage your existing Azure CLI login context. No custom scripting required.
The migration is designed to be seamless. You can maintain your existing SSL.com certificate during the Azure setup process, then switch over once Azure Artifact Signing is validated and tested. This ensures no disruption to production deployments while you transition to the new automated workflow.


Krishna Kurapati is the Founder and CEO of QliqSOFT. He has more than two decades of technology entrepreneurship experience. Kurapati started QliqSOFT with the strong desire to solve clinical collaboration and workflow challenges using artificial intelligence (AI)-powered digital technologies across the U.S. healthcare system.


